Enterprise Security

Blog: AR for Cyber Training? I’m In

Briefing: T-Systems Targets UK Security Market

T-Systems wants to become Europe's largest provider of cyber security services. This HardenStance Briefing looks at how growing market share in the UK is key to achieving that goal.

Blog: AR for Cyber Training? I’m In

White Paper: Next Steps in Playbook-Driven Cyber Security

This White Paper, sponsored by The Cyber Threat Alliance, IBM Security, KPN and Nokia looks at the importance of using Defensive and Incident Response (IR) playbooks as a foundational building block of security automation.  

Blog: AR for Cyber Training? I’m In

Blog: NSS Labs Suit vs AMTSO Dismissed

The U.S. District Court for the Northern District of California has dismissed the NSS Labs Anti Trust lawsuit against AMTSO. Thank goodness.

Blog: AR for Cyber Training? I’m In

Briefing: A New Window into an OpenC2 World

The OpenC2 Forum has approved its first specifications, putting the standard on a footing with which it can scale out into commercial deployments and increase speed and efficiency in cyber security operations.

Blog: AR for Cyber Training? I’m In

Briefing: The NSS Labs Apology to CrowdStrike

The NSS Labs apology to CrowdStrike and resolution of their lawsuits is progress as far as it goes. But it still leaves outstanding the NSS antitrust suit against AMTSO.

Blog: AR for Cyber Training? I’m In

Briefing: IBM Security and Cisco Mean Business

It's clear from the proof-points offered up in a recent webcast that IBM Security and Cisco are serious about their cyber security alliance. In the near future, though, the partners will disrupt the cyber security market at the margins rather than transforming it.

Cyber Security Innovators: Orange Polska

Cyber Security Innovators: Orange Polska

Orange Polska can point to three clear examples of how SecBI's Autonomous Investigation software has detected threats that other security controls missed.    

Blog: AR for Cyber Training? I’m In

Briefing: Container Security the Red Hat Way

Red Hat has a substantial portfolio of security features for container environments. These are designed to protect both the application and the underlying infrastructure.

Register

HardenStance on Twitter

Archive